Debian Security Advisory
DSA-2103-1 smbind -- sql injection
- Date Reported:
- 05 Sep 2010
- Affected Packages:
- smbind
- Vulnerable:
- Yes
- Security database references:
- No other external database security references currently available.
- More information:
-
It was discovered that smbind, a PHP-based tool for managing DNS zones for BIND, does not properly validating input. An unauthenticated remote attacker could execute arbitrary SQL commands or gain access to the admin account.
For the stable distribution (lenny), this problem has been fixed in version 0.4.7-3+lenny1.
For the unstable distribution (sid), this problem has been fixed in version 0.4.7-5, and will migrate to the testing distribution (squeeze) shortly.
We recommend that you upgrade your smbind (0.4.7-3+lenny1) package.
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1.diff.gz
- http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1.dsc
- http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/s/smbind/smbind_0.4.7-3+lenny1_all.deb
MD5 checksums of the listed files are available in the original advisory.